Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Blockchain-based decentralized storage systems for sustainable data self-sovereignty: A comparative study
In the digital age, data sovereignty has emerged as a critical concern due to the increasing
demand for privacy, security, and user control. In this context, decentralized storage …
demand for privacy, security, and user control. In this context, decentralized storage …
Hybrid architectures used in the protection of large healthcare records based on cloud and blockchain integration: A review
LJR Lopez, D Millan Mayorga, LH Martinez Poveda… - Computers, 2024 - mdpi.com
The management of large medical files poses a critical challenge in the health sector, with
conventional systems facing deficiencies in security, scalability, and efficiency. Blockchain …
conventional systems facing deficiencies in security, scalability, and efficiency. Blockchain …
BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing
Y Zuo, Z Kang, J Xu, Z Chen - International journal of …, 2021 - journals.sagepub.com
It is the most important and challenging problem to share the data safely in cloud computing.
Some so-called trusted third parties may also infringe users' data privacy. It is an urgent …
Some so-called trusted third parties may also infringe users' data privacy. It is an urgent …
[HTML][HTML] Proposed model for secured data storage in decentralized cloud by blockchain ethereum
Since cloud computing is an essential component of any modern company (usually
accounting for a considerable share of information technology (IT) infrastructure investment) …
accounting for a considerable share of information technology (IT) infrastructure investment) …
Protecting data and queries in cloud-based scenarios
The availability of cloud services offered by different providers brings several advantages to
users and companies, facilitating the storage, sharing, and processing of data. At the same …
users and companies, facilitating the storage, sharing, and processing of data. At the same …
Reliable policy updating under efficient policy hidden fine-grained access control framework for cloud data sharing
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is one of the potent encryption
paradigms in protecting data confidentiality in the cloud data sharing scenario. However, the …
paradigms in protecting data confidentiality in the cloud data sharing scenario. However, the …
EDCOMA: Enabling Efficient Double Compressed Auditing for Blockchain-Based Decentralized Storage
Blockchain technology, known for its decentralized and immutable nature, serves as the
foundation for various applications. As a prominent application of blockchain, decentralized …
foundation for various applications. As a prominent application of blockchain, decentralized …
Data security in cloud environment using cryptographic mechanism
Virtual computing resources are provided via a cloud system that is both clever and
intelligent. Based on the user's request, computing resources are made available. A hybrid …
intelligent. Based on the user's request, computing resources are made available. A hybrid …
CryptoHHO: a bio-inspired cryptosystem for data security in Fog–Cloud architecture
The exponential growth of Internet-of-Things (IoT) has raised several data security risks to
the Fog–Cloud architecture. The performance and the computation cost of security …
the Fog–Cloud architecture. The performance and the computation cost of security …
Socialchain: Decoupling social data and applications to return your data ownership
Social data produced from widely emerged social media activities are expected to promote
information dissemination and engagement, or even make business intelligence more …
information dissemination and engagement, or even make business intelligence more …